{"id":12523,"date":"2018-06-10T10:45:02","date_gmt":"2018-06-10T18:45:02","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2018\/06\/10\/news-6292\/"},"modified":"2018-06-10T10:45:02","modified_gmt":"2018-06-10T18:45:02","slug":"news-6292","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2018\/06\/10\/news-6292\/","title":{"rendered":"How Microsoft&#8217;s Windows Red Team Keeps PCs Safe"},"content":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/media.wired.com\/photos\/5b1af5ff2b3a2d7b09334431\/master\/pass\/Microsoft-Windows-Red-Team_Final.png\"\/><\/p>\n<p><strong>Credit to Author: Brian Barrett| Date: Sun, 10 Jun 2018 11:00:00 +0000<\/strong><\/p>\n<p><span class=\"lede\">One of them<\/span> jailbroke Nintendo handhelds in a former life. Another has more than one zero-day exploit to his name. A third signed on just prior to the <a href=\"https:\/\/www.wired.com\/story\/eternalblue-leaked-nsa-spy-tool-hacked-world\/\">devastating Shadow Brokers leak<\/a>. These are a few of the members of the Windows red team, a group of hackers inside Microsoft who spend their days finding holes in the world\u2019s most popular operating system. Without them, you\u2019d be toast.<\/p>\n<p>Many companies have a red team, or several, and they generally share the same purpose\u2014to play the role of an attacker, probing releases new and old for vulnerabilities, hoping to catch bugs before the bad guys do. Few of them, though, focus on a target as ubiquitous as Windows, an operating system that <a href=\"https:\/\/netmarketshare.com\/operating-system-market-share.aspx?options=%7B%22filter%22%3A%7B%22%24and%22%3A%5B%7B%22deviceType%22%3A%7B%22%24in%22%3A%5B%22Desktop%2Flaptop%22%5D%7D%7D%5D%7D%2C%22dateLabel%22%3A%22Custom%22%2C%22attributes%22%3A%22share%22%2C%22group%22%3A%22platform%22%2C%22sort%22%3A%7B%22share%22%3A-1%7D%2C%22id%22%3A%22platformsDesktop%22%2C%22dateInterval%22%3A%22Monthly%22%2C%22dateStart%22%3A%222018-05%22%2C%22dateEnd%22%3A%222018-05%22%2C%22segments%22%3A%22-1000%22%7D\" target=\"_blank\">still boasts<\/a> nearly 90 percent market share for laptop and desktop computers worldwide. When Windows breaks, the whole world hears the shatter.<\/p>\n<p class=\"paywall\">The Windows red team didn\u2019t exist four years ago. That\u2019s around the time that David Weston, who currently leads the crew as principal security group manager for Windows, made his pitch for Microsoft to rethink how it handled the security of its marquee product.<\/p>\n<p class=\"paywall\">\u201cMost of our hardening of the Windows operating system in previous generations was: Wait for a big attack to happen, or wait for someone to tell us about a new technique, and then spend some time trying to fix that,\u201d Weston says. \u201cObviously that\u2019s not ideal when the stakes are very high.\u201d<\/p>\n<p class=\"paywall\">Weston wanted to go beyond Microsoft\u2019s historical mode of using bug bounties and community relationships to formulate a defense. He was tired of the reactive crouch, of responding to known issues rather than discovering new ones. He wanted to play some offense.<\/p>\n<p class=\"paywall\">Drawing inspiration from his experience with whitehat hackers at events like Pwn2Own\u2014and tired of waiting until the competition ended to glean valuable insights into Windows vulnerabilities\u2014Weston began putting together a team that would essentially conduct a Windows-focused hacking contest every day of the year.<\/p>\n<p>You can only scan for problems you already know about. A red team finds the ones you don\u2019t.<\/p>\n<p class=\"paywall\">Today, members of that team include Jordan Rabet, whom David noticed after Rabet showed off an impressive Nintendo 3DS jailbreak in a <a href=\"https:\/\/www.youtube.com\/watch?v=iKjuy3-z054\" target=\"_blank\">2014 YouTube video<\/a>. Rabet currently focuses on browser security but also played a key role in Microsoft\u2019s <a href=\"https:\/\/www.wired.com\/story\/critical-intel-flaw-breaks-basic-security-for-most-computers\/\">response to the Spectre vulnerability<\/a> that rocked the computer industry less than a year ago.<\/p>\n<p class=\"paywall\">Viktor Brange, who lives in Sweden, helped respond to <a href=\"https:\/\/www.wired.com\/story\/eternalblue-leaked-nsa-spy-tool-hacked-world\/\">leaked NSA Windows-hacking tool Eternal Blue<\/a> by sifting through Microsoft code base, ascertaining the severity of various issues to triage. Adam Zabrocki\u2019s deep Linux experience helps tackle kernel and virtualization issues. Jasika Bawa helps transform the team\u2019s findings into actual product improvements. And two other members of the team WIRED spoke with for this story do sensitive enough work that they requested anonymity.<\/p>\n<p class=\"paywall\">Together, the red teamers spend their days attacking Windows. Every year, they develop a zero-day exploit to test their defensive blue-team counterparts. And when emergencies like Spectre or EternalBlue happen, they&#x27;re among the first to get the call.<\/p>\n<p class=\"paywall\">Again, red teams aren\u2019t novel; companies that can afford them\u2014and that are aware they could be targeted\u2014tend to use them. If anything, it may come as a surprise that Microsoft hadn\u2019t sicced one on Windows until so recently. Microsoft as a company already had several other red teams in place by the time Weston built one for Windows, though those focused more on operational issues like unpatched machines.<\/p>\n<p class=\"paywall\">\u201cWindows is still the central repository of malware and exploits. Practically, there\u2019s so much business done around the world on Windows. The attacker mentality is to get the biggest return on investment in what you develop in terms of code and exploits,\u201d says Aaron Lint, who regularly works with red teams in his role as chief scientist at application protection provider Arxan. \u201cWindows is the obvious target.\u201d<\/p>\n<p class=\"paywall\">Training that mindset internally on Windows has already paid dividends. In addition to helping mitigate Spectre and EternalBlue\u2014the team can only say so much about what, exactly, they did in either case\u2014they\u2019ve notched some important wins that helped not only Microsoft, but the entire industry.<\/p>\n<p class=\"paywall\">At the top of Weston\u2019s list is shutting down a phishing attack used by notorious Russian hacking group Fancy Bear, which Microsoft calls Strontium, by <a href=\"https:\/\/cloudblogs.microsoft.com\/microsoftsecure\/2017\/01\/13\/hardening-windows-10-with-zero-day-exploit-mitigations\/\" target=\"_blank\">shoring up Win32k<\/a>, a Windows kernel-driver and popular hacker punching bag.<\/p>\n<p class=\"paywall\">\u201cIn most browser attacks, you first need to compromise what\u2019s called the browser sandbox, and then you need a way out of that sandbox to do what attackers want to do, information theft or persistent access to the machine,\u201d Weston says. \u201cIt turns out that this very old and large kernel surface is the ideal place to do that.\u201d<\/p>\n<p class=\"paywall\">By attacking that surface through the eyes of an adversary, the team found previously undisclosed techniques to leverage it in an attack. Which meant, in turn, that Microsoft was able to ship an update that blocked those same efforts in Windows 10 Anniversary Edition in the fall of 2016. The Windows 10 Creators Update, released six months later, took even further steps to detect kernel exploits.<\/p>\n<p class=\"paywall\">It\u2019s an important win, and one that may not have come so quickly had Microsoft relied on more traditional methods of vulnerability-spotting.<\/p>\n<p class=\"paywall\">\u201cWhat it tends to be is finding the issues that are a little bit beyond the pale in terms of security vulnerability, that might not be a immediately apparent or directly searchable, findable from vulnerability scanning techniques,\u201d Arxan\u2019s Lint says. After all, you can only scan for problems you already know about. A red team finds the ones you don\u2019t.<\/p>\n<p class=\"paywall\">The members of the red team don\u2019t have a specific quota; they\u2019ll prioritize targets based on things like what they\u2019ve seen hackers exploit in the wild or which features are relatively untested and sensitive.<\/p>\n<p class=\"paywall\">\u201cWe want to emulate the kinds of things we\u2019ve seen in the wild and then take it to the next level,\u201d says Rabet. \u201cPeople were doing something a couple of years ago; where are they going to go next? And we try to go in that direction.\u201d<\/p>\n<p class=\"paywall\">At the same time, the team needs to be selective. \u201cBugs will always be there,\u201d Zabrocki says. \u201cWe can\u2019t fix all the bugs in the world,\u201d especially with as big and complex and constantly evolving a product as Windows. Better, then, to focus on broader solutions like kernel anomaly detection, which can help prevent a whole host of woes.<\/p>\n<p class=\"paywall\">And solving a problem entirely sometimes isn\u2019t even the objective. Every time the Windows red team starts a project, they also start a clock.<\/p>\n<p>&#x27;We want to emulate the kinds of things we\u2019ve seen in the wild and then take it to the next level.&#x27;<\/p>\n<p name=\"inset-left\" class=\"inset-left-component__el\">Jordan Rabet, Microsoft<\/p>\n<p class=\"paywall\">\u201cThe goal of the timer is to give us an objective cost analysis of what it takes to hack something,\u201d Weston says. \u201cA start-to-finish, median cost to attack something puts an economic tag on a compromise that\u2019s something we can drive up over time, which we think is a good objective metric.\u201d The more time and money a hack costs to execute, in other words, the less likely an attacker will be to pursue it. Weston hands out computer-shaped trophies for particularly good finds.<\/p>\n<p class=\"paywall\">The red team doesn\u2019t issue patches, of course, which can lead to some frustrations if they find what they view as a pressing vulnerability that ends up not getting a timely fix. \u201cA lot of it depends on the internal mechanisms within the company. It\u2019s a big company. There are a lot of people who want to have a say in how we do things,\u201d says one anonymous team member, who laments that Microsoft can sometimes take months to fix what both internal and external security researchers see as serious issues.<\/p>\n<p class=\"paywall\">Helping set those priorities is Bawa, who uses the red team\u2019s activity as an \u201cinternal barometer\u201d of how effective Microsoft\u2019s endpoint detection products are\u2014especially against attacks they\u2019ve never seen before. \u201cIt really comes down to being able to look at their activity as a blueprint for what we might expect from state of the art activity coming from outside of Microsoft.\u201d<\/p>\n<p class=\"paywall\">Windows will always be a popular hacker target, and Weston\u2019s team is just one piece of Microsoft\u2019s efforts to protect it. But given the sophistication of hackers, whether they\u2019re nation states or criminal syndicates, it\u2019s at least comforting to know that there\u2019s a team in Redmond keeping pace with the bad guys\u2014and even staying one step ahead.<\/p>\n<p class=\"related-cne-video-component__dek\">It seems like every time you turn around there&#39;s a new breach of personal information. Follow these steps to minimize the damage.<\/p>\n<p><a href=\"https:\/\/www.wired.com\/story\/microsoft-windows-red-team\" target=\"bwo\" >https:\/\/www.wired.com\/category\/security\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/media.wired.com\/photos\/5b1af5ff2b3a2d7b09334431\/master\/pass\/Microsoft-Windows-Red-Team_Final.png\"\/><\/p>\n<p><strong>Credit to Author: Brian Barrett| Date: Sun, 10 Jun 2018 11:00:00 +0000<\/strong><\/p>\n<p>Microsoft&#8217;s Windows red team probes and prods the world&#8217;s biggest operating system through the eyes of an adversary.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10378,10607],"tags":[714],"class_list":["post-12523","post","type-post","status-publish","format-standard","hentry","category-security","category-wired","tag-security"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/12523","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=12523"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/12523\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=12523"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=12523"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=12523"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}